The internet Flashcards
what is the internet
a network of interconnected networks set up to allow computers to communicate with each other globally
when can the internet be used without the world wide web
- using email protocols like SMTP to send messages and IMAP to receive them
- file sharing
- voice calls
- gaming
- messaging apps
structure of the internet - backbone
- the main part of the internet
- set of dedicated connections that connect several large networks at various parts of the globe
- each of these points are then connected to other regional networks
- usually controlled by ISPS (internet service providers)
what are ISPs
Internet service providers
- connect to the backbone
- distribute/sell the internet connection to smaller providers
- who then provide access to individual end users/homes
structure of the internet - internet addresses
- each device on a network needs to be uniquely identified so that data can be sent to the correct destination
- internet addresses are unique numerical or alphanumerical identifiers used to identify devices or websites on the internet
- they use the IP address system
structure of the internet - internet registries
- ensure that a particular domain name is only used by one organisation
- provides a marketplace for available domain names
- managed domain names, dispute resolution services
- registers individual or company details
Structure of the internet - URL’s
A UNIFORM RESOURCE LOCATER is the full address for an internet resource.
it specifies the location/address of a resource on the internet
Structure of the internet - Domain names and the Domain name system
a domain nameidentifies the area or domain that an internet resource resides in
- these are structured into a hierarchy of smaller domains
what is a fully qualified domain name
one that includes the host server name, eg www, mail,
- www.blahblah.com
structure of the internet - IP addresses
- is a unique address that is assigned to a network device
- indicates where a packet of data is to be sent or has been sent from
describe the main purpose of the DNS system and how it works
HOW IT WORKS:
- DNS stores a database of fully qualified domain names and corresponding IP addresses
- DNS is a* distributed database of mappings*
- individual mappings are only known by some DNS servers
- DNS servers are ordered into a hierarchy
PURPOSE:
- Translates fully qualified domain names into IP addresses
what is circuit switching
- creating a communication connecting two endpoints for the duration of a phone call or transfer of data
- but wasnt scalable, so packet switching was created
what is packet switching
- communicating packets of data across a network
- where other similar communications are happening simultaneously
what are data packets
how many bytes of data does each packet usually contain?
what does each packet contain?
equal sized chunks that data is broken up into when sending data across a network
- each packet typically contains 1,500 bytes of data
- each packet contains a header and a payload containing the body of data being sent
- some packets may also use a trailer with a checksum
advantages of data packets
increases network efficiency and reliability
what is a checksum
Outline how the checksum’s value will be determined
- Something to check if the contents of the
packet have been corrupted during transmission - Calculated from the
payload of the packet
what is the header
includes:
- the senders and recipients IP addresses
- the protocol being used in the packet
- the number of the packet in the sequence being sent
- also include the hop limit/time to live
- packet length
what is the hop limit or TTL(time to live)
the point at which the data packet expires and is discarded
why is the senders IP address included in the packet header
- in order to identify the sender
- to send a request back to the sender if it contains data transmission errors
- to notify the sender if the packet cannot be delivered.
what do routers do
- Connects two networks together
- determines which node to send packet to next
- Router uses most efficient path to the destination
- Router modifies the (MAC/hardware) addresses for the next hop
what is a hop
each forwarding by(or transfer across) a network
what is a routing algorithm
used to find the optimum route
what is a gateway
what is the functionality of a gateway beyond that of a router
- a device that is required where data is travelling from one network to another that use different protocols
- networks using different transmission media can require this
2.protocol conversion
how does a gateway work
- all of the header data is stripped from the packet, leaving only the raw data
- the new header data is added in the format of the new network before the gateway sends the packet on its way
packet size
- kept small to ensure that individual packets do not take excessive time to transfer
- preventing other packets from moving
- However, they should not be too small, as the additional data added makes data transfer inefficient as unnecessary headers and trailers are used
summarise the packet trailer
- contains the error checking component (checksum)
describe the operations of packet switching
- data broken down into packets
- source/destination IP is added to each packet
- packet routed independently
- packets reassembled into message
- errors are checked for
- if theres an error, request for corrupted packets to be resent
what is a firewall
a software or hardware that controls access to and from a network
- it prevents unauthorised access between two networks
what does a firewall consist of
- a separate computer with 2 NICs(network interface cards), with one connected to the trusted network, and the other connected to the external one
what is a port
gates that only certain types of traffic is allowed to pass through, dependent on its IP addresses
summarise packet filtering
- packets of data are inspected by the firewall to check which point they want to access
- different protocols use different numbers
- if this traffic is allowed through, the port must be opened for the duration of the connection
- otherwise, the firewall will automatically reject it
what does packet filtering do
controls network access according to network administrator rules and policies
- by examining the source and destination IP addresses in packet header
what port does HTTP traffic use
80 or 808
What is stateful inspection in a firewall
- used instead of relying on port numbers or IP addresses
- it examines the payload of a packet to better assess it for safety, before allowing access
-tracks the state of active connections and allows packets that are part of an established connection.
meaning of proxy
on behalf of
what is a proxy server
- makes a web request on behalf of your own computer
- intercepts all packets entering and leaving a network
- **hides the true network address **of the source from the recipient
advantages of a proxy server
- enables privacy
- can be used to filter undesirable content
- logs user data with their requests
- enables anonymous surfing
- can maintain a cache of websites commonly visited to speed access times
what is encryptionnn
the act of encoding a plaintext msg so that it cannot be deciphered unless unless u have a key to decrypt it
what is symmetric encryption
when the same key is used to encrypt and decrypt
risks of using symmetric encryption
- If either party loses the key or it is stolen, the system is broken. If the key is also intercepted along with the data, the message can be deciphered.
- Man-in-the-Middle (MITM) Attack:
- During key exchange, an attacker intercepts the shared key and decrypts the communication.
- Complete compromise of confidentiality and privacy; attackers can read or alter data undetected.
what is asymmetric encryption
using separate but related keys
summarise asymmetric encryption
- the public key is made public so that others can send data and encrypt the data
- public key CANNOT decrypt data
- a private key is known only by you and can be used to decrypt data
- impossible to deduce the private key from the public key
how does a digital signature work
- sender applies hashing algorithm to message to create a hash value
- hash calculated from message text
- hash encrypted using senders private key
- creates digital signature
- signature appended to message
- message with signature needs to be encrypted using receivers public key
- signature decrypted using senders private key
- hash value recalculated and compared
- A match is accepted as genuine
what is a digital signature
a security stamp that offers greater security
what is a digital certificate
something that verifies that a senders public key is formally registered to that particular sender
features of a digital certificate
- issued by the CA(Certificate authorities)
contains: - serial number
- expiry date
- subjects public key
- name id the CA
what does a firewall do
- blocks/allows traffic on specific ports
- blocks specific protocols
- blocks specific IP addresses
- Blocks/allows certain types of packets
- acts as a proxy server
- identifies unusual behaviour from hosts
- Why is packet switching used?
- What is the role of routers in packet switching?
- Packet switching breaks data into packets and routes them independently across a network for efficient use of resources.
- Routers forward packets to their destination by analyzing their headers and choosing the optimal path.
What is the purpose of a digital signature
To verify the authenticity and integrity of a message.
difference between well known ports and client ports
Well-known ports are ports that have a specific purpose like HTTP and FTP.
Client ports are temporary ports used by devices to establish connections with servers.
what other things are included in a data packet
Port number(s);
destination port number and source port number as separate marks
Sequence number;
Time to live;
Packet size/length;
Type of service;
Protocol identifier;
Packet identifier/ID number;
IP version;
Options/Padding;
Flags;
Window size value;
Fragment offset // header length;
how is it possible for unauthorised data to be collected via wifi
- wifi signals can travel outside of property
- any wifi receiver in range can read the data packets
- no need to physically “tap” into a wifi connection, unlike a cabled connection
- a protocol that does not encrypt the transmissions may have been used